Operations | Monitoring | ITSM | DevOps | Cloud

Fortifying security for Ubuntu on Azure with Metadata Security Protocol (MSP)

We’re pleased to share a security enhancement for Ubuntu workloads on Microsoft Azure. In collaboration with Microsoft, Ubuntu now supports Azure’s Metadata Security Protocol (MSP)—a feature that hardens access to the Instance Metadata Service (IMDS) and WireServer. On Ubuntu, MSP is enabled by the azure-proxy-agent package, Canonical’s integration of Microsoft’s Guest Proxy Agent (GPA).

How to build an awesome cloud gaming platform with Anbox Cloud

Cloud gaming is changing the way we play. Instead of buying expensive hardware, players stream games from the cloud, like Netflix for games. This is no longer a futuristic idea, it’s here. Services like NVIDIA GeForce Now, Sony PS Plus, and Xbox Cloud Gaming have shown what’s possible: playing high-end games on low-end devices by streaming all of your favorite games – from indie to AAA – from powerful cloud servers.

Canonical achieves IEC 62443-4-1 compliance in Industrial Automation and Control Systems

Canonical is proud to announce it has achieved compliance with IEC 62443-4-1 for cybersecurity in Industrial Automation and Control Systems (IACS). Building on Canonical’s existing ISO/SAE 21434 certification, this milestone expands Ubuntu’s leadership in securing critical infrastructure at the intersection of IT and operational technology (OT) environments.

What are dependencies, and how do you secure them?

Open source software is everywhere. Research shows that around 97% of codebases contain open source software, and it’s clear to see why. It’s always magical to realize that there are thousands of free-to-use, ready-built programs and code repositories that solve problems you’d otherwise need to spend weeks building the solutions for from scratch. However, like with all software, you still need to ensure that your software supply chain is secure and safe to consume.

What's the state of open source adoption in Europe?

The Linux Foundation’s latest report, Open source as Europe’s strategic advantage: trends, barriers, and priorities for the European open source community amid regulatory and geopolitical shifts, provides key insights into how European enterprises are using open source software (OSS), as well as the barriers towards further development of open source in the continent.

Bringing Canonical Kubernetes to Sylva: a new chapter for European telco clouds

The telecommunications industry is undergoing its most significant transformation in decades. The move from vertically integrated, proprietary systems to disaggregated, cloud-native infrastructure has unlocked enormous potential for agility and innovation. Yet, for many operators, the challenge has been how to realize that potential while meeting the stringent performance, security, and interoperability requirements that telecom networks demand.

Implement an enterprise-ready data lakehouse architecture with Spark and Kyuubi

Here at Canonical we are excited to announce that we have shipped the first release of our solution for enterprise-ready data lakehouses, built on the combination of Apache Spark and Apache Kyuubi. Using our Charmed Apache Kyuubi in integration with Spark, you can deliver a robust, production-level, and open source data lakehouse. Our Apache Kyuubi charm integrates tightly as part of the Charmed Apache Spark bundle, providing a single and simpler-to-use SQL interface to big data analytics enthusiasts.

54% of European enterprises want long term open source support: how Ubuntu Pro + Support delivers

Europe’s open source ecosystem is at a turning point. The Linux Foundation’s Open Source as Europe’s Strategic Advantage: Trends, Barriers, and Priorities for the European Open Source Community amid Regulatory and Geopolitical Shifts report shows organizations across the continent are broadly adopting open source software (OSS). But adoption alone doesn’t guarantee resilience, innovation, or security.

Using ISO/SAE 21434 to stay ahead of the Cyber Resilience Act

If you work in automotive, you’ve probably already heard of the CRA – the EU’s Cyber Resilience Act. It’s one of the most ambitious pieces of cybersecurity regulation in years. And while it wasn’t written specifically for cars, it’s going to impact a huge part of how software gets built, updated, and maintained across the automotive stack. So here’s the question: how do you prepare for something like the CRA?